
CVE-2024-26927 – ASoC: SOF: Add some bounds checking to firmware data
https://notcve.org/view.php?id=CVE-2024-26927
28 Apr 2024 — In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Add some bounds checking to firmware data Smatch complains about "head->full_size - head->header_size" can underflow. • https://git.kernel.org/stable/c/d2458baa799fff377660d86323dd20a3f4deecb4 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-21905 – QTS, QuTS hero, QuTScloud
https://notcve.org/view.php?id=CVE-2024-21905
26 Apr 2024 — An integer overflow or wraparound vulnerability has been reported to affect several QNAP operating system versions. ... Ya hemos solucionado la vulnerabilidad en las siguientes versiones: QTS 5.1.3.2578 build 20231110 y posteriores QuTS hero h5.1.3.2578 build 20231110 y posteriores QuTScloud c5.1.5.2651 y posteriores An integer overflow or wraparound vulnerability has been reported to affect several QNAP operating system versions. • https://www.qnap.com/en/security-advisory/qsa-24-16 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-26925 – netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
https://notcve.org/view.php?id=CVE-2024-26925
24 Apr 2024 — Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. • https://git.kernel.org/stable/c/4b6346dc1edfb9839d6edee7360ed31a22fa6c95 • CWE-667: Improper Locking •

CVE-2024-32040 – FreeRDP vulnerable to integer underflow in nsc_rle_decode
https://notcve.org/view.php?id=CVE-2024-32040
22 Apr 2024 — FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. • https://github.com/FreeRDP/FreeRDP/pull/10077 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-32039 – FreeRDP Integer overflow & OutOfBound Write in clear_decompress_residual_data
https://notcve.org/view.php?id=CVE-2024-32039
22 Apr 2024 — FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. ... Affected versions of FreeRDP are vulnerable to an integer overflow and out-of-bounds write. • https://github.com/FreeRDP/FreeRDP/pull/10077 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVE-2024-23531 – Ivanti Avalanche WLInfoRailService Integer Overflow Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-23531
19 Apr 2024 — An Integer Overflow vulnerability in WLInfoRailService component of Ivanti Avalanche before 6.4.3 allows an unauthenticated remote attacker to perform denial of service attacks. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before reading from memory. • https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US • CWE-190: Integer Overflow or Wraparound •

CVE-2024-2961 – glibc: Out of bounds write in iconv may lead to remote code execution
https://notcve.org/view.php?id=CVE-2024-2961
17 Apr 2024 — It was discovered that GNU C Library when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution. • https://packetstorm.news/files/id/182289 • CWE-787: Out-of-bounds Write •

CVE-2024-26913 – drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue
https://notcve.org/view.php?id=CVE-2024-26913
17 Apr 2024 — In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue [why] odm calculation is missing for pipe split policy determination and cause Underflow/Corruption issue. ... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue [why] odm calculation is missing for pipe split policy determination and cause Underflow/Corruption issue. • https://git.kernel.org/stable/c/cdbe0be8874c63bca85b8c38e5b1eecbdd18df31 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-26884 – bpf: Fix hashtab overflow check on 32-bit arches
https://notcve.org/view.php?id=CVE-2024-26884
17 Apr 2024 — In the Linux kernel, the following vulnerability has been resolved: bpf: Fix hashtab overflow check on 32-bit arches The hashtab code relies on roundup_pow_of_two() to compute the number of hash buckets, and contains an overflow check by checking if the resulting value is 0. However, on 32-bit arches, the roundup code itself can overflow by doing a 32-bit left-shift of an unsigned long value, which is undefined behaviour, so it is not guaranteed to truncate neatly. This was triggered by syzbot on the DEVMAP... • https://git.kernel.org/stable/c/daaf427c6ab392bedcd018e326b2ffa1e1110cd6 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound •

CVE-2024-26843 – efi: runtime: Fix potential overflow of soft-reserved region size
https://notcve.org/view.php?id=CVE-2024-26843
17 Apr 2024 — Due to an integer overflow, certain EFI-related memory reservations might receive a size other than expected, leading to a denial of service. • https://git.kernel.org/stable/c/4fff3d735baea104017f2e3c245e27cdc79f2426 • CWE-121: Stack-based Buffer Overflow •